Siemens RUGGEDCOM ROX II

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.6
  • ATTENTION: Low Attack Complexity
  • Vendor: Siemens
  • Equipment: RUGGEDCOM ROX II family
  • Vulnerability: Authentication Bypass Using an Alternate Path or Channel

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow a local attacker to bypass authentication and access a root shell on the device.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Siemens reports that the following products are affected:

  • RUGGEDCOM ROX MX5000: All versions
  • RUGGEDCOM ROX RX1536: All versions
  • RUGGEDCOM ROX RX5000: All versions
  • RUGGEDCOM ROX MX5000RE: All versions
  • RUGGEDCOM ROX RX1400: All versions
  • RUGGEDCOM ROX RX1500: All versions
  • RUGGEDCOM ROX RX1501: All versions
  • RUGGEDCOM ROX RX1510: All versions
  • RUGGEDCOM ROX RX1511: All versions
  • RUGGEDCOM ROX RX1512: All versions
  • RUGGEDCOM ROX RX1524: All versions

3.2 VULNERABILITY OVERVIEW

3.2.1 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288

Affected devices do not properly limit access through its Built-In-Self-Test (BIST) mode. This could allow an attacker with physical access to the serial interface to bypass authentication and get access to a root shell on the device.

CVE-2025-40761 has been assigned to this vulnerability. A CVSS v3.1 b

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: